Sciweavers

990 search results - page 122 / 198
» An efficient data structure for network anomaly detection
Sort
View
SAC
2006
ACM
13 years 8 months ago
Efficient interactive configuration of unbounded modular systems
Interactive configuration guides a user searching through a large combinatorial space of solutions to a system of constraints. We investigate a class of very expressive underlying...
Erik Roland van der Meer, Andrzej Wasowski, Henrik...
RECSYS
2010
ACM
13 years 8 months ago
Interactive recommendations in social endorsement networks
An increasing number of social networking platforms are giving users the option to endorse entities that they find appealing, such as videos, photos, or even other users. We defin...
Theodoros Lappas, Dimitrios Gunopulos
ISNN
2005
Springer
14 years 1 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
IWEC
2008
13 years 9 months ago
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
14 years 2 months ago
Minimizing Energy Consumption in IR-UWB Based Wireless Sensor Networks
Abstract—Impulse Radio Ultra-wideband (IR-UWB) communication has proven an important technique for supporting highrate, short-range, low-power communication. These are necessary ...
Tianqi Wang, Wendi B. Heinzelman, Alireza Seyedi